版權(quán)說明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請(qǐng)進(jìn)行舉報(bào)或認(rèn)領(lǐng)
文檔簡(jiǎn)介
PAGE
11
PAGE
10
6GTRUSTWORTHINESSCONSIDERATIONS
byNGMNAlliance
Version: 1.0
Date: 04.10.2023
DocumentType: FinalDeliverable(approved)
ConfidentialityClass: P-Public
Project: 6GTrustworthinessConsiderations
Approvedby/Date: NGMNBoard,14September2023
ForPublicdocuments(P):
?2023NextGenerationMobileNetworksAlliancee.V.Allrightsreserved.NopartofthisdocumentmaybereproducedortransmittedinanyformorbyanymeanswithoutpriorwrittenpermissionfromNGMNAlliancee.V.
TheinformationcontainedinthisdocumentrepresentsthecurrentviewheldbyNGMNAlliancee.V.ontheissuesdiscussedasofthedateofpublication.Thisdocumentisprovided“asis”withnowarrantieswhatsoeverincludinganywarrantyofmerchantability,non-infringement,orfitnessforanyparticularpurpose.Allliability(includingliabilityforinfringementofanypropertyrights)relatingtotheuseofinformationinthisdocumentisdisclaimed.Nolicense,expressorimplied,toanyintellectualpropertyrightsaregrantedherein.Thisdocumentisdistri-butedforinformationalpurposesonlyandissubjecttochangewithoutnotice.
EXECUTIVESUMMARY
Asthemobileindustrycontinuestolookatthenextgenerationofmobilenetworks,NGMNAlliance(NGMN)isfirmlyestablishedasaleadingforcedrivingdiscussionsonthedevelopmentof5Gandemerging6Gusecases[1].Whileattentionisoftenfocusedonextendingexcitingapplicationssuchasimmersiveextendedreality(XR),digitaltwin,interactingcobots,andtrustednativeAI,NGMNfirmlybelievesitisessentialtoestablishtheindisputabletrustworthinessofthe6Gnetwork.
Consideringthis,NGMNhasidentifiedseveraltechnologytrendsthatwillinfluencethetrustworthinessofa6GnetworkincludingnetworkAI,opensource,virtualisationandcontainerization,andquantumcomputingwhichmightbringnewsecuritythreats.6Gnetworksmustthereforehaveaninherenttrustworthinessdesigntopromotetheeffectivenessofsecurityprotectionandenhancetheabilityofprivacyprotection,suchastrustedcomputingandblockchain.
Inthesubsequentsectionsofthispublication,wepullallthesetechnologytrendstoge-ther,providingtheindustrywithcomprehensiveguidancetoensuretrustworthinessinthe6Gnetwork.Byembracingaholisticapproachtosecurityandprivacy,wecannotonlyenabletherealisationoffuture6Gusecasesbutalsosafeguardtheinterestsandtrustofend-users.
CONTENTS
01
INTRODUCTION 5
02
KEYDRIVERSOF6G
TRUSTWORTHINESS 6-7
Societaldemands
6
Networkevolutiondemands
6
Servicedrivendemands 6
Securitytechnologiesdrivendemands 7
3.1Enhancedhumancommunication 8
03
USECASESANALYSIS 8-11
DESIGNCONSIDERATIONSOF6G
TRUSTWORTHINESS 15-16
05
Decentralisedtrustfoundation 15
Dynamictrustmodel 15
Intelligentcollaboration 15
Securityasaservice 16
Trustandriskassessment 16
06
CONCLUSIONANDROADMAP 17
ABBREVIATIONS 18
07
Enhancedmachinecommunication 8-9
Enablingservices 9-10
Networkevolution 11
04
6GTRUSTWORTHINESS
REQUIREMENTS 12-14
ACKNOWLEDGEMENTS 19
REFERENCES 20
INTRODUCTION
Themobilenetworkisacriticalelementofbothsocietalandindustrialdevelopment.6GtelecommunicationssystemdevelopmentshavealreadybegunintheindustrywithNGMNhavingidentifiedthat6Gneedstobedrivenbysocietalgoals,marketexpectationsandoperationalnecessities.6Gwillenableandextendbothcurrent5Gusecasesaswellas6Genvisionedusescases[2].6Gmobilenetworkinfrastructuremustsupportcurrentandenvisio-nedusecasesandbeabletoadapttonewtechnologiesandberesilienttonewattackvectors.A6Gmobilenet-workshouldbetrustedtodelivertheseusecasesacrossseveraltrustworthinessaspectsincludingsecurity,privacy,reliability,resilience,andsafety[3].
Thetermof“trustworthiness”inthispublicationiscom-posedofthefollowingfiveaspectsbyreferringtotheNationalInstituteofStandardsandTechnology’s[NIST]definition[3]withminoradaptationstothemobilenetworks:
Security:Theabilityofthemobilenetworkstoensurethatallitsinfrastructure,processes,mechanisms,protocolsandservices,physicalorcyber,areaffordedinternalorexternalprotectionfromunintendedandunauthorisedaccess,change,damage,destruction,oruse.Securityusuallyconsistsofthefollowingthreefacets:
Confidentiality:Preservingauthorisedrestrictionsonaccessanddisclosureoftheinformationbeingtransferredbetweenparties.
Integrity:Guardingagainstimpropermodificationordestructionofinformationintransitandincludesensuringnon-repudiationandauthenticity.
Availability:Ensuringtimelyandreliableaccesstoanduseofthemobilenetwork.
Privacy:Theabilityofthemobilenetworktoprevententities(people,machines)fromgainingaccesstoper-sonaldatastoredin,createdby,ortransitingamobilenetworkoritscomponentssuchthatindividualsorgroupscanobscurethemselvesorinformationaboutthemselvesfromothers.Privacyisaconditionthatresultsfromtheestablishmentandmaintenanceofacollectionofmethodstosupportthemitigationofriskstoindividualsarisingfromtheprocessingoftheirper-sonalinformationwithinoramongsystemsorthroughthemanipulationofphysicalenvironments.
Reliability:Theabilityofthemobilenetworktodeli-verstableandpredictableperformanceinexpectedconditions.
Resilience:Theabilityofthemobilenetworktowithstandinstability,unexpectedconditions,andgracefullyreturntopredictable,butpossiblydegraded,performance.
Safety:Theabilityofthemobilenetworkstoensuretheabsenceofcatastrophicconsequencesonthelife,health,property,ordataofmobilenetworksstakeholdersandthephysicalenvironment.Notethatalthoughmobilenetworkshavedifferentmechanismstoprotectthedataintransmission,thereisstillnowaytoguaranteetheauthenticityofthedataorigin.
Trustworthinessisrelatedtotheabilitytomitigatethesecurityrisksinthemobilenetwork.Eventhoughtheabovefiveaspectsareconsideredinthedesignphaseofthemobilenetwork,thetrustworthinessofthemobilenetworksystemismostlydependentonoperators’de-ploymentimplementationandconfiguration.Whenthefivedimensionsoftrustworthinessareapplied,acommonpracticeshouldbefollowedtoensuretherobustnessofthemobilenetworkwhileatthesametime,consistentmonitoringandassessmentisalsorequiredtoenhancethetrustworthiness.
Thispublicationfurtheranalysesthekeydriversandtypicalusecasesinrelationto6Gtrustworthinessanddeliversthe6Gsecurityrequirementscoveringtheaspectsofsecurity,reliability,privacy,resilienceandsafety.Sec-tion2investigatesthekeydriversof6Gtrustworthinessincludingsocietal,networkevolution,servicedrivenandsecuritytechnologydrivendemands.Section3detailsthespecificusecaseanalysiswithsecurityrisksandrequirementsanalysed,followedbyasummaryof6GtrustworthinessrequirementswithclassificationandconsolidationinSection4.NGMNprovidesguidancetothe6Gtechnologydesign,describedinSection5,inordertofulfilthetrustworthinessneedsforthecustomersandMobileNetworkOperators(MNOs).
KEYDRIVERSOF6GTRUSTWORTHINESS
SOCIETALDEMANDS
TheUnitedNationsSustainableDevelopmentGoals(UNSDGs)haveidentifiedaccesstomobileconnectivityasakeydriverofsustainableeconomicgrowthandassociatedsocietaldevelopment.Publicsafetyanddataprivacypro-tectionsarethefoundationofsocietaldevelopment.6Gisenvisagedtofurtherenhancepublicsafetyanddataprivacywhileenablingsocietaldevelopmentthroughusecaseslikesmartcity,intelligentinteractivesystems,intelligentmedicaltreatment,smarttransportation,educationandsmartretail.Theseusecasesareimportantforboththedevelopmentandgrowthoftheglobalsociety.Significantexposureofprivacysystemsandheavyprocessingofuserdataapplications(e.g.,industrialintelligentcontrol,driverlessvehicles,virtualrealityandotherhigh-techrelatedindustries)willrequirefundamentalprotectionsbebuiltinto6G.Basically,thehighertheimpactofdataandcontrolsystemsexposure,themoreprotectionsandreliabilitythatneedstobebuiltin.Thismeans6Gtrustworthinessrequirementsmustalignwithsocietaldemandinsecuringanindividual’sdailyactivitiesandsocietalchallenges.
NETWORKEVOLUTIONDEMANDS
The6Gnetworkisexpectedtoprovidecoverageinhard-to-reachruralareas,andthismayincludenon-conventionalsolutionssuchasnon-terrestrialhigh-altitude-platformsorsatellite-basedservicestodelivermobileservices.Thisconvergencewillcreatemassivedataandresourceswhichwillincreasinglyrelyonreliablenetworkoperation.Furt-hermore,mitigationmustbeprovidedagainstvulnerabi-litiesinthenetworkduetocomponentandfunctionalitysplitsintroducedbyvirtualisation.Sensingnetwork,asa
newnetworkfeature,willintegratewithcommunicationcapabilitiestoachieveserviceintegration,whichwillde-mandagilesecuritymechanismnegotiationandultra-fi-ne-grainedsecurityscheduling.Tocontinuouslyimprovetheuserexperience,the6Gnetworkwillbecomemoredistributedandprovideuniqueservicescentredonusers.Thiswillrequireappropriateadaptationinthe6Gsecurityarchitecture.Ascomputingpowerbecomesthenewdriverofnetworkevolution,thecomputingcollaborationandintelligentconnectionwillbecomeinherentattributesofthenetwork,withbuilt-insecurityanessentialfeature.
SERVICEDRIVENDEMANDS
Theextensivecoverage,connectivityandreliablenetworkcapabilityof6Gwillenableitscommunicationinfrastruc-turetodevelopfromtheInternetofEverything(IoE)totheintelligentinternet.Itwillnotonlyprovidemorecoverage,butalsomakethedigitalworldandthephysicalworlddeeplyintegrated,people'sliveswillincreasinglyrelyonreliablenetworkoperation.Inthe6Gera,immersiveex-perience,telepresence,multimodalinteraction,sensingandXRtechnologymaybecomemainstreamapplications.Fromtheinterconnectionofallthingstointelligence,theservicevalueofthe6Gnetworkinthefuturewillalsobeenhanced,thiswillundoubtedlyhaveagreatimpactoninterestdrivenattackers.Manyofthoseservicesrequirehighdata-rates,lowlatencyaswellasprecisepositioningandsensing,servedbydifferentendpointsinthe6Gnet-work,e.g.,intheedgeorinthecloud.Forcriticalservicesastrictend-to-endisolationandprotectionofnetworkslicesincludingtheRadioAccessNetwork(RAN)mayberequired.6Gisthereforerequiredtoprovidestrongersecurityprotectioncapabilities.Atthesametime,duetotheenhancedflexibilityanddynamicexpansionofthenetwork,the6Gsecuritycapabilitiesarerequiredtobefine-grainedandflexibleondemand,toensurethedynamicadaptationofthenetwork,theuserdemandsandbusinessscenarios.
SECURITYTECHNOLOGIESDRIVENDEMANDS
Therapiddevelopmentofnewtechnologiesandnewideaswillbecomeoneofthekeydrivingforcesofsecurityevolution.Securitytechnologyismovingforwardswithmorenativeintelligenceandflexibility.Thedevelopmentofthesenewtechnologies/principleswillpromotetheeffectivenessofsecurityprotectionandenhancetheab-ilityofprivacyprotection.Itisnecessarytoconsiderhowtointroduceandapplythesenewtechnologiesin6Gtoimprovethelevelofsecurityprotection,suchastrustedcomputing,blockchain,zerotrust,etc.;Thedevelopmentofsometechnologieswillbringsomechallengestothesecurityoftheexistingcommunicationsystem.Forexam-ple,quantumcomputingtechnologybringsriskstotheexistingcryptosystem.Itisnecessarytoconsiderhowtodealwiththeimpactofsuchnewtechnologies.AIandMLareexpectedtobeintegratedbydesigninthe6Garchi-tecture,thoughthisbringsmorerisksandvulnerabilitiestothesystem,thesecanbeleveragedtoautomatedetec-tionofnewthreats,anomaliesandcyberattacks.FurtherAIcanassisttopredictthebreachriskofthedifferentassetsandnetworkfunctionsinthesystem,consideringtheindividualthreatexposuresothatcountermeasurestomitigatevulnerabilitiescanbeplanned.Anotherappli-cationofAIisendpointprotection,whereAIcandetectnovelmalwareandransomwarewheresignature-baseddetectionmechanismswouldfail.
USECASESANALYSIS
ENHANCEDHUMANCOMMUNICATION
Fromthesecurityperspective,XRimmersiveholographictelepresenceandmultimodalcommunicationfortele-operationseemslikelytoattractmoresecurityattacksbecauseofitscoexistencewithpotentialadversaryentitiesinanopenenvironmentanditsincreasedpointsofattackwithdatafrommultiplesourcesandsensors.Thethreatsandrequirementsnon-exhaustivelyincludethefollowing:
Privacyofhumanbiometricdata:Ononehand,inXRapplicationsbiometrics-basedauthenticationismorewidelyused,suchasfingerprint,eyescan,facerecogni-tionetc.Ontheotherhand,humancentricmultimodalsensorydataincludinghuman’saudio,video,taste,odour,hapticandemotioninformationcouldbetransferredinbulkintheoverallnetwork.Duetotheirrevocablenatureofhumanbiometricdata,itrepresentsaveryimportantprivacyissuetobetackledby6G.
Protectionoftheinterfacebetweenthephysicalandvirtualworld:XRimmersiveholographictelepresencecommunicationenablesthedigitalrepresentationofthephysicalworldinavirtualnetwork(digitaltwinnetwork).Duetothedenseandreal-timeinteractionbetweenthetwinnetworkandthephysicalnetwork,thevirtualtwinnetworkitselfmayhavevariousunknownsecurityvulnerabilities,andtheinteractioninterfacebetweenthetwowillbepotentiallyvulnerabletoexternalattacks,resultinginthevirtualtwinnetworkgivingwronginst-ructionstothephysicalnetwork,threateningthedevicesecurity,networksecurityandbusinesssecurityinthephysicalnetwork.Technologiestoensurethesecurityofthetwinnetworkitselfanditsinteractionwiththephysicalnetworkarethereforesignificant.
Preventionofdevicecompromise:Enhancedhumancommunicationreliesonthedeploymentofdevicesandsensorsinanopenenvironment,andhenceismoreindangerofbeingcompromisedthroughphysicalcontactorvisualobservationbyexternalattacks.Asaresultofdevicecompromise,user’scredentialscanbestolenordirectlyaccessed.Itisthereforecrucialtopreventanex-ternalattackfromdirectlyexploitingsuchacompromise.
PrivacyanddataprotectioninMetaverse:InMe-taverseanavatarrepresentingausercansmoothlytraversebetweendifferent“worlds”,allofwhichasawholecompriseaMetaverse.Agooddesignoffedera-tionofauthenticationandidentityisexpectedtoallowasmoothtraverseofanavatarbetween“worlds”.AMobileNetworkOperator(MNO)thatoffersasystemtoenterMetaverse,orotherbusinessentities,whicharesufficientlytrustedbyusers,maybeabletoassistrealisationofMetaverseinthisaspect.Ifauserisledtoamalicious“world“byafakeuserconsentforaprompt-lesstraversetothemalicious“world”,theusermightbeexposedtomaliciousactivities.Userconsentneedstobewellprotected,inparticularwithregardtointegrity.Anavataristobeuniqueandshouldnotbeeasilycopiedforusetorepresentsomeoneelse.Copyandreuseofavatardataneedstobeprevented.Whengivingtheuser’sinformationtoany“world”,nationaland/orregionalregulationanduser’sconsentneedstobeconsidered.
ENHANCEDMACHINECOMMUNICATION
Theenhancedmachinecommunicationcanbedescribedwithsomegenericusecasessuchasrobotnetworkfabricwhereforexampleautonomousmobilerobots,drones,automaticguidedvehicles(AGV)willbemovingthroughthesmartcityandprovideparceldeliveryservicesorservicesforpersonaluse.Theserobotscommunicatewithboththe6Gnetworkandeachotherandthecommunicationrequiresahighreliabilityandlowlatencytoavoidcollisi-ons.Toavoidaccidentsanddamagetohumans,robotsaswellastheircommunicationsmustbesecuredtoprotectagainsthijackingandmalevolentmanipulation.Sincetherobotsmoveautonomouslyandrelyontheinformationreceivedfromthenetworktotakedecisions,theintegrityoftherelevantdataneedstobeguaranteed.
Anotherfurtherenhancedusecasewillbeinteractingcollaborativerobots(cobots),cobotsprovideacloserinter-actionbetweenhumansandrobotsandshouldinterpretthehumanactionsinordertoassistthehumans.Thosecobotscouldbeaseparatemachineoramachineclosetothehumane.g.,exoskeletonoradaptivewheelchair.Thedetectionofthehumanactionmaybebasedonmachine
learningandartificialintelligence;thus,theintegrityofthemachinelearningmodelmustensureanyresultingdecisionofthecobotdoesnotleadtodamageorinjuriestothehumans.Furthercommunicationwithsensorsorthe6Gnetworkmustbeprotectedtoavoidfalsedecisionsthatleadtowrongactionsnotintendedbythehumans.Ingeneral,hijackingandmalevolentmanipulationonro-bots[4]canincludeintentionmodificationattacks,wherethecommandmessagesfromacontrollertotherobotaremodifiedtoredirectthemessagesortomodifythedataonthetargetrobot.IntentionmodificationattacksincludesDenialofServiceattacks(DoS).RobothaltingasaresultofaDoSattackmaycausetherobottostoporperformundesiredmovements.TherecanalsobeadelayinrespondingtodirectioncommandsforrobotssubjecttoDoSattacks,thusthattherobotathighspeeddoesnotreacttonavigationcommandsinstantlyandmaythereforecauseaccidents.
Intentionmodificationattacksareperformedbyanadver-saryasakindofmaninthemiddleattack(MitM)wherethemessagesfromtherobottothecontrolleraremanipulatedandthecontrolleridentifiesthemaslegitimatefeedbackandusesthemasinputforthenextcontrolmessageswhichcanleadtowrongcontroldecisions.
Thehijackingattackisverycrucialsincetheadversarytakesovercontroloftherobotandexecutescommandsnotintendedbythelegitimatecontrollerandcanleadtoservicedisruptionforthetimethehijackingattackiscarriedout.
For6Gmultidomainheterogeneousinterconnection,themassivediversityandconcurrencyofsensorsmayaccessthenetworkfrequently,lightweightaccessauthenticationmustbeenabledwithoutcompromisingsecurity.
TheevolutionofInternetofVehicles(IoV)willgeneratealargeamountofdatawhichshouldnotbetamperedwith.Theinformationexchangedincludestheintrinsicattributesofentitiesanddynamicinteractiondataofentities.Entityintrinsicattributesincludevehicleintrinsicinformation,suchasvehiclemodel,engineparameters,fuelconsumption,vehiclecondition,etc.UserprivacyinformationincludesIDcardinformation,phonenumber,drivers’licenseinformation,andbankaccount;inherentinformationaboutroadsidefacilities,suchassensortypeandlocation.TheIoVsourcetracingsystemisacontrolsystemthatcantrackdataintheIoVforward,backward,ordirectionless.Traditionalcentralisedsourcetracingsystems
maybeinvadedbyexternalhackers,andmaliciousentitiesinsidethesourcetracingsystemsmaybetamperedwithatlowcost.Thus,amoredecentraliseddatastorageandsourcetracingsystemneedstobeconsidered.
ENABLINGSERVICES
DataSecurityandprivacyarethecrucialaspectstomostoftheenablingserviceswhichrelyon6Gcommunicationsuchas3Dhyper-accuratepositioning,localisation,andtracking,interactivemapping,digitalhealthcare,automaticdetection,recognitionandinspection,smartindustry,andtrustedcompositionofservices.
Securityandprivacyinpositioning,localisation,andtracking:Positioningandtrackingservicesassociatedtodevicesusedbyhumanandnon-humanassetsarebothcriticaltosecurityandsafetyaspositioningservicecompromise(e.g.,tamperingofcommunicationlinks,gainingoflocationdataandcontrollingbyimpersona-tion)mayleadtoillegitimatetrackingofhumanusers.Similarlyfornon-humanassetssuchasdevices,objects,robots,drones,vehicles,positioningservicecompromisemayleadtovariousriskssuchasexecutingmaliciouscontrols,hijackofdevices,forcingintoaccidentstoimpactthedependentbusinessetc.
Datasecuritywithinteractivemappinganddigitaltwins:Asdigitaltransformationunlocksnewvalueitalsobringsnewthreatlandscape.Incaseofinteractivemappinganddigitaltwinsitisessentialtoidentifyandadoptmetricsthatdefineanaccuratevirtualdigitalmodelrelatedtoareal-timephysicalrepresentation.Lackofconformancetostandardmetricsforthevirtualdigitaltwinwillgreatlyimpactnotonlytheoperationanalysisandobservationsbutalsothesecurityandcyberresiliencewhentherespectivephysicaldeviceormodelisutilised.Furtheravirtualdigitalmodelduringitstes-ting,feedbackdriveniterativeconstruction,observationandanalysisphasecaninvolvemultiplestakeholderstocollaborateandoperatethevirtualdigitalmodel.Ifthevirtualdigitaltwinmodelprocessinginvolvesanybusiness-criticaldataorreal-timeuserdata,lackofsuf-ficientcriticaldatatranslationsandprocesshidingwillrevealthesensitivedatathusimpactingthebusinessandprivacyrequirement.
Securedatastorage,processing,andexposurecontrolfordigitalhealthcare:In-bodydevicesandwearables-baseddatacollection,processingandmedicalinferencedataexposurearecriticaloperationsassociatedtodigitalhealthcare.Ifanyofthedatalinksarecompromised,itmayleadtoseriousrisksassociatedtothehealthcaresystem’sreputation.Inmostofthecases,thedataprocessingassociatedtohealthcaremaybeprocessedattheend-deviceorifadvancedmedicalprocessingisrequired,thedatamaybeprocessedinindependentdevices/gateways,whereifsufficientdataprocessingsecurityandstoragesecurityisnotadopted,thismayleadtodataleakageanddatamanipulationforvariedreasons(e.g.,personalgainssuchasinsurancebenefits).Theprocessingdevicesshouldensurenon-repudiation(e.g.,withdistributedledgerssupportingbothonchainandoffchainstorage)andthecommunicationlinksshouldbesufficientlyauthenticated(i.e.,multimodal),authorisedandsecured.
Securityforintelligenceandautomation:Smartandintelligentdevicesareexpectedtobedeployedformonitoringservicessuchastomonitorvitalsignsinhealthcare/criticalunits,tomonitorpassengersandbelongingsduringsafetycheck-ins(e.g.,inairport),crowdscreening(e.g.,inanymallorsensitivepublicspots/privatesports)etc.Ifsuchmonitoringdevicesandassociatedcommunicationlinksarecompromised,falsereportingcanimpactpeoplewithseriouslegalconse-quences.Further,maliciouscontrolofsuchmonitoringdevicesduetovulnerabilitiesintheend-devicesorlackofsecurityinthecommunicationlinkcanprovidemal-icioususerswithaccesstosensitivedata.
Securityforresilientoperationsinsmartindustry:Smartindustryinvolvesautomationinproductdesign,factoryproductionlinesandsupplychainetc.Eachphaseinvolvesvariousdevices(i.e.,operationale.g.,manufacturingfunctionalunit,andassistancedevicessuchasAGVs),software,operator(e.g.,human)digitalcommunicationetc.Eachcommunicationlink,devicesandoperationaldataprocessesneedstobeaccounta-bleandauditableinreal-timetoensureoverallsecureoperation.
Trustedcompositeservicesanduser-controlledprivacy:Compositeservicesinvolvesconvergentnet-workstooffervariedon-demandend-userserviceswithenhancedhumanandmachinecommunication.Asitrequirestrustworthyrelationshipstobeset-upwhenanewon-demandserviceisrequestedbytheend-users/device,itisahugechallengetoofferidentityverificationcontrolincompliancewithallregionalregulations.Mostservicesubscriptionactivationsrequiresubmissionofuserdocuments(e.g.,passport,nationalidentitycard,drivinglicenseetc.)andverificationofuserdocumentsbythirdparties.Governmentdatabasesarealsousedtoenabletheserviceprovider(s)toperformidentityverification.Butiftheidentitydocumentsareforgedandmisusedbythethirdpartyoriftheidentityrelateddocumentarecompromisedatthethirdparty’spremise,itmayleadtoseriousissuessuchasserviceproviderfines(ifthebreachisidentified),serviceproviderreputationalharm[5],andtheend-usermayfacelegalissues,ortheirsafetyputatriskiftheiridentityismisused.Blockchainbaseddigitalidentitysuchasdecentralisedidentityandself-sovereignidentity[6]canenabletheend-userstohavecontrolovertheiridentity(i.e.,serviceidentity)andcontrolovertheidentityinformationdisclosed(e.g.,controlleddatadisclosure).
Overall,selectiveapplicationofsecuritybythecommunica-tionnetworkshouldbeavoided,e.g.,relyingon3rdpartyapplicationsecurityforsomeservicesandnotmandatingcommunicationnetworksecurity(i.e.,signallinganduserplane)fortheserviceswillend-upwithnosecuritybeingappliedforthecriticalservices.Inconclusionthereneedstobeastandardisedapproachtoco-ordinateandapplysecurityandprivacymeasures,aswellasthreatmitigationtechniquesasacommonsecuritybaselineforthe6Gde-pendentservices.
NETWORKEVOLUTION
Torealisethevisionof"smartconnection"inthe6Gera,artificialintelligencetechnologywillbefullyintegratedintothenextgenerationofmobilecommunicationsystems.ThedeepintegrationofAIand6Gnetworkwillbringnewopportunitiesforthebuilt-insecurityof6Gnetworks.Multi-dimensionaldataperceptionandlearningsuchasnetworkdata,businessdataanduserdata,willhelpthenetworksecurityintelligence,improvetheefficiency,flexibilityandsecurityautonomyofthecommunicationsystem,reducethenetworksecurityoperationcost,andbuildameasurableandevolvingendogenoussecurityprotectionsystem.
Basedonbigdataanalysistechnologyanddeeplearningalgorithmmodels,theexponentialgrowthof6Gnetworkdatacanbehandled;alsofeaturesofattackbehaviourandthreatintelligencecanbemodelledorextracted.Thesystem
溫馨提示
- 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請(qǐng)下載最新的WinRAR軟件解壓。
- 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請(qǐng)聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
- 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁內(nèi)容里面會(huì)有圖紙預(yù)覽,若沒有圖紙預(yù)覽就沒有圖紙。
- 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
- 5. 人人文庫網(wǎng)僅提供信息存儲(chǔ)空間,僅對(duì)用戶上傳內(nèi)容的表現(xiàn)方式做保護(hù)處理,對(duì)用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對(duì)任何下載內(nèi)容負(fù)責(zé)。
- 6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請(qǐng)與我們聯(lián)系,我們立即糾正。
- 7. 本站不保證下載資源的準(zhǔn)確性、安全性和完整性, 同時(shí)也不承擔(dān)用戶因使用這些下載資源對(duì)自己和他人造成任何形式的傷害或損失。
最新文檔
- 醫(yī)療器械銷售合同:醫(yī)療器械銷售協(xié)議醫(yī)療器械銷售協(xié)議醫(yī)療器械銷售協(xié)議
- 2026年工字軌項(xiàng)目營(yíng)銷方案
- 2025年四川省資陽市中考數(shù)學(xué)真題卷含答案解析
- 2026年廣西西寧市高三一模高考語文試卷試題(含答案詳解)
- 2025年麻醉科麻醉操作流程規(guī)范模擬考試試題及答案解析
- 2025年低壓電工復(fù)審必考題庫及答案
- 2026年保密工作總結(jié)
- 現(xiàn)場(chǎng)隱患排查與治理
- 2025年不動(dòng)產(chǎn)登記代理人考試題目及答案
- 某鋼結(jié)構(gòu)廠房防火涂料施工方案
- 設(shè)備安裝施工方案范本
- 衛(wèi)生院副院長(zhǎng)先進(jìn)事跡材料
- 復(fù)發(fā)性抑郁癥個(gè)案查房課件
- 網(wǎng)絡(luò)直播創(chuàng)業(yè)計(jì)劃書
- 人類學(xué)概論(第四版)課件 第1、2章 人類學(xué)要義第一節(jié)何為人類學(xué)、人類學(xué)的理論發(fā)展過程
- 《功能性食品學(xué)》第七章-輔助改善記憶的功能性食品
- 幕墻工程竣工驗(yàn)收?qǐng)?bào)告2-2
- 1、工程竣工決算財(cái)務(wù)審計(jì)服務(wù)項(xiàng)目投標(biāo)技術(shù)方案
- 改進(jìn)維持性血液透析患者貧血狀況PDCA
- 阿司匹林在心血管疾病級(jí)預(yù)防中的應(yīng)用
- D500-D505 2016年合訂本防雷與接地圖集
評(píng)論
0/150
提交評(píng)論